Appendix A: Attack Spoofing

It's exceedingly easy to parse the Snort signature ruleset, craft matching
packet data, and blast it on the wire from spoofed source addresses.
Appendix A discusses a sample Perl script
snortspoof.pl
(bundled with fwsnort) that does just this. For reference, this script
is shown below as well: